Tuesday, 9 August 2016

APT2 - Automated Penetration Toolkit

This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will be used to launch exploit and enumeration modules according to the configurable Safe Level and enumerated service information.

All module results are stored on localhost and are part of APT2's Knowledge Base (KB). The KB is accessible from within the application and allows the user to view the harvested results of an exploit module.

Setup On Kali Linux install python-nmap library:

sudo pip install python-nmapsudo pip install neovim

Configuration (Optional) APT2 uses the default.cfg file in the root directory. Edit this file to configure APT2 to run as you desire. Current options include:

NMAP Configure NMAP scan settings to include the target, scan type, scan port range, and scan flags. These settings can be configured while the program is running.

Threading Configure the number of the threads APT2 will use.

Run:

No Options: python apt2 or ./apt2

With Configuration File python apt2 -C <config.txt>

Import Nexpose, Nessus, or NMap XML python apt2 -f <nmap.xml>

Specify Target Range to Start python apt2 -f 192.168.1.0/24

Safe Level Safe levels indicate how safe a module is to run againsts a target. The scale runs from 1 to 5 with 5 being the safest. The default configuration uses a Safe Level of 4 but can be set with the -s or --safelevel command line flags.